The principle of chaos and its war against cyber threats

Cyber systems are based on biological models; for billions of years of life, nature has established effective and advanced defense systems, and it’s natural to investigate and imitate them.

By EREZ KAPLAN HAELION
August 22, 2018 12:16
The principle of chaos and its war against cyber threats

Erez Kaplan Haelion, CTO of Cyber 2.0. (photo credit: Courtesy)

 
X

Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later


In different situations of war, it always seems that one side precedes the other, and sometimes the opposite happens – the other side is a step ahead.
Why, then, in the cyber world, with thousands of cyber companies that employ the best minds in the world, the permanent situation is that attackers are always one step ahead and that a focused attack will always penetrate all the existing defense systems?

I have been preoccupied with this problem for a long time. Against all the protection systems deployed in the organization, and at every level of information security, attackers always manage to penetrate, spy, exploit and destroy.
The explanation is seemingly trivial: there is no system that cannot be hacked, so the hackers will always find a way to penetrate all the organizational defenses. It has always been so, and it is likely to be like that forever.
As a result, information security personnel are constantly in pursuit of the next hacking, preparing for the next penetration, and finding themselves drowning in a sea of alerts from various systems, all of which can eventually be bypassed.
The conventional concept is that every defense system is a type of perforated network, so the more layers we add to each other, the less likely it is that a future attack will penetrate the first layer, and even if it does not stop at a second layer, it will stop at a third or fourth.

Read More...

Join Jerusalem Post Premium Plus now for just $5 and upgrade your experience with an ads-free website and exclusive content. Click here>>

Related Content